PKI and digital certification infrastructure

被引:23
|
作者
Hunt, R [1 ]
机构
[1] Univ Canterbury, Dept Comp Sci, Canterbury, New Zealand
关键词
D O I
10.1109/ICON.2001.962346
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable communications. This paper discusses these key technologies focusing particularly on recent standardisation as well as looking at some of the challenges pending its widespread operation in the industry.
引用
收藏
页码:234 / 239
页数:2
相关论文
共 50 条
  • [21] NAS Infrastructure for UAS: Certification Aspect
    Jain, Ravi
    2017 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE (ICNS), 2017,
  • [22] A new and scalable certification path discovery model in the emerging global PKI
    Gao, Zhiwei
    Luo, Ping
    Gu, Zhimin
    Liu, Hongjun
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 372 - +
  • [23] Interoperation between a conventional PKI and an ID-based infrastructure
    Price, G
    Mitchell, CJ
    PUBLIC KEY INFRASTRUCTURE, 2005, 3545 : 73 - 85
  • [24] A PKI-based scalable security infrastructure for scalable grid
    Huang, LC
    Wu, ZH
    GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 1051 - 1054
  • [25] Decentralization of the current PKI infrastructure without losing backward compatibility
    Tzvetkov, Vesselin
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 691 - 695
  • [26] PKI(Public Key Infrastructure)的缺陷与新一代PKI的展望
    顾成威
    计算机与数字工程, 2006, (06) : 55 - 57
  • [27] PKI, elliptic curve cryptography, and digital signatures
    Caelli, William J.
    Dawson, Edward P.
    Rea, Scott A.
    Computers and Security, 1999, 18 (01): : 47 - 66
  • [28] PKI, elliptic curve cryptography, and digital signatures
    Caelli, WJ
    Dawson, EP
    Rea, SA
    COMPUTERS & SECURITY, 1999, 18 (01) : 47 - 66
  • [29] The Design of Digital Signature System Based on PKI
    Wang, Chao
    Hao, Zhongxiao
    Wang, Quan
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 1323 - +
  • [30] Mobile messaging using Public Key Infrastructure: m-PKI
    Anuar, Nor Badrul
    Kuen, Lai Ngan
    Zakaria, Omar
    Gani, Abdullah
    PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS, 2008, : 76 - +